Scalable secure multiparty computation

Ivan Damgård, Yuval Ishai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

85 Scopus citations

Abstract

We present the first general protocol for secure multiparty computation which is scalable, in the sense that the amortized work per player does not grow, and in some natural settings even vanishes, with the number of players. Our protocol is secure against an active adversary which may adaptively corrupt up to some constant fraction of the players. The protocol can be implemented in a constant number rounds assuming the existence of a "computationally simple" pseudorandom generator, or in a small non-constant number of rounds assuming an arbitrary pseudorandom generator.

Original languageEnglish
Title of host publicationAdvances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
Pages501-520
Number of pages20
DOIs
StatePublished - 2006
Event26th Annual International Cryptology Conference, CRYPTO 2006 - Seattle, WA, United States
Duration: 20 Aug 200624 Aug 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4117 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference26th Annual International Cryptology Conference, CRYPTO 2006
Country/TerritoryUnited States
CitySeattle, WA
Period20/08/0624/08/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Scalable secure multiparty computation'. Together they form a unique fingerprint.

Cite this